International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.5, September 2012
DESIGN AND VALIDATION OF SPECIFICATION BASED IDS FOR POWER ENHANCEMENT RELATED VULNERABILITIES IN AODV1 Chaitali Biswas Dutta1, Utpal Biswas2 1 Research Scholar, Dept of CSE, University of Kalyani, India Asst. Prof., Dept of CA, GIMT, Guwahati, India mail.chaitali@yahoo.in 2
University Of Kalyani, Dept of CSE, University of Kalyani, Nadia, West Bengal, India utpal01in@yahoo.com
ABSTRACT Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, worm hole, mad in the middle etc. Several Intrusion detection systems (IDS) have been proposed which successfully detect these attacks. Among these IDSs signature based and anomaly based are simple in nature but generate false alarms. To cater to this issue, recently specification based IDS is proposed for WSNs which have low false alarms yet detect most of the attacks. Lots of works have been reported on enhancement of AODV to improve throughput, PDR, NRO, End to End delay, power etc. Power Aware AODV (POW-AODV), enhances WNSs from the perspective of lifetime of nodes (in terms of power). In this paper we show that POW-AODV gets subject to more vulnerability, compared to AODV, in the effort to reduce power. Such attacks reduce life time of nodes instead of increasing them. Following that we propose a specification based IDS for this protocol to detect these vulnerabilities. We also show a using NS-2 simulation that using the IDS POW-AODV leads to increase in lifetime of nodes, even in presence of attacks.
KEYWORDS Wireless Sensor Network, Ad-Hoc on Demand routing protocol, Fault-Tolerance.
1. INTRODUCTION Now-a day’s wireless technology has become very popular because of the convenience that comes with its use. Wireless sensor network (WSN) [1], [2] is basically a wireless network, is comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. The WSNs are used in various important fields, like forest fire detection, flood detection, military purposes, tracking and monitoring doctors and patients inside a hospital, home application, commercial application etc. Wireless network is highly dynamic. Topology changes, link breakage, node failure happen quite frequently. That is why routing is an important factor in case of wireless network. If nodes are within the range then routing is not required. Otherwise routing protocol is necessary because routing protocols specify that how routers communicate with each other. Routing protocols in wireless sensor 1 1 This journal paper is an extended version of the conference paper "Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV� by Chaitali Biswas Dutta and Utpal Biswas, presented in The Fifth International Conference on Network Security & Applications (CNSA-2012).
DOI : 10.5121/ijnsa.2012.4505
57